Abstract is missing.
- Insider Threat Event Detection in User-System InteractionsPablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp. 1-12 [doi]
- Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its UserspaceMatt Shockley, Chris Maixner, Ryan V. Johnson, Mitch DeRidder, W. Michael Petullo. 13-24 [doi]
- Complexity of Insider Attacks to DatabasesGökhan Kul, Shambhu J. Upadhyaya, Andrew Hughes. 25-32 [doi]
- A Multi-Modal Neuro-Physiological Study of Malicious Insider ThreatsYassir Hashem, Hassan Takabi, Ram Dantu, Rodney D. Nielsen. 33-44 [doi]
- TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified CompetitionAthul Harilal, Flavio Toffalini, John Henry Castellanos, Juan Guarnizo, Ivan Homoliak, Martín Ochoa. 45-56 [doi]
- MemTri: A Memory Forensics Triage Tool Using Bayesian Network and VolatilityAntonis Michalas, Rohan Murray. 57-66 [doi]
- A Subliminal Channel in EdDSA: Information Leakage with High-Speed SignaturesAlexander Hartl, Robert Annessi, Tanja Zseby. 67-78 [doi]
- Research Challenges and Opportunities in Big Forensic DataKim-Kwang Raymond Choo. 79-80 [doi]
- Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using BlockchainVishal Sharma, Ilsun You, Gökhan Kul. 81-84 [doi]
- Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGXNir Drucker, Shay Gueron. 85-88 [doi]
- Behavior Prediction over Summarized Network ActivitiesShih-Chieh Su. 89-92 [doi]
- Insider Threat Mitigation Using Moving Target Defense and DeceptionHassan Takabi, Jafar Haadi Jafarian. 93-96 [doi]
- Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of InsidersMookyu Park, Junwoo Seo, Kyoungmin Kim, Moosung Park, Kyungho Lee. 97-100 [doi]